Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): firmware
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-35837 |
An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. Authentication for web interface is completed via an unauthenticated WiFi AP. The administrative password for the web interface has a default password, equal to the registration ID of the device. This same registration ID is used as the WiFi SSID name. No routine is in place to force a change to this password on first use or bring its default state to the attention of the user. Once authenticated, an attacker can reconfigure the device or upload new firmware, both of which can lead to Denial of Service, code execution, or Escalation of Privileges. Published: January 23, 2024; 6:15:08 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-6926 |
There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access. Published: January 23, 2024; 3:15:45 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-42143 |
Missing Integrity Check in Shelly TRV 20220811-152343/v2.1.8@5afc928c allows malicious users to create a backdoor by redirecting the device to an attacker-controlled machine which serves the manipulated firmware file. The device is updated with the manipulated firmware. Published: January 23, 2024; 3:15:45 PM -0500 |
V3.1: 5.4 MEDIUM V2.0:(not available) |
CVE-2023-42766 |
Improper input validation in some Intel NUC 8 Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. Published: January 19, 2024; 3:15:11 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-42429 |
Improper buffer restrictions in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. Published: January 19, 2024; 3:15:11 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38587 |
Improper input validation in some Intel NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. Published: January 19, 2024; 3:15:10 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-29495 |
Improper input validation for some Intel NUC BIOS firmware before version IN0048 may allow a privileged user to potentially enable escalation of privilege via local access. Published: January 19, 2024; 3:15:09 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28743 |
Improper input validation for some Intel NUC BIOS firmware before version QN0073 may allow a privileged user to potentially enable escalation of privilege via local access. Published: January 19, 2024; 3:15:09 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28738 |
Improper input validation for some Intel NUC BIOS firmware before version JY0070 may allow a privileged user to potentially enable escalation of privilege via local access. Published: January 19, 2024; 3:15:09 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-28722 |
Improper buffer restrictions for some Intel NUC BIOS firmware before version IN0048 may allow a privileged user to potentially enable escalation of privilege via local access. Published: January 19, 2024; 3:15:09 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-51217 |
An issue discovered in TenghuTOS TWS-200 firmware version:V4.0-201809201424 allows a remote attacker to execute arbitrary code via crafted command on the ping page component. Published: January 18, 2024; 4:15:08 PM -0500 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-49515 |
Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components. Published: January 16, 2024; 9:15:06 PM -0500 |
V3.1: 4.6 MEDIUM V2.0:(not available) |
CVE-2023-49351 |
A stack-based buffer overflow vulnerability in /bin/webs binary in Edimax BR6478AC V2 firmware veraion v1.23 allows attackers to overwrite other values located on the stack due to an incorrect use of the strcpy() function. Published: January 16, 2024; 2:15:08 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2024-22028 |
Insufficient technical documentation issue exists in thermal camera TMC series all firmware versions. The user of the affected product is not aware of the internally saved data. By accessing the affected product physically, an attacker may retrieve the internal data. Published: January 15, 2024; 2:15:09 AM -0500 |
V3.1: 4.6 MEDIUM V2.0:(not available) |
CVE-2024-0230 |
A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic. Published: January 12, 2024; 6:15:08 PM -0500 |
V3.1: 2.4 LOW V2.0:(not available) |
CVE-2023-28897 |
The secret value used for access to critical UDS services of the MIB3 infotainment is hardcoded in the firmware. Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022. Published: January 12, 2024; 11:15:51 AM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-51073 |
An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh. Published: January 10, 2024; 10:15:10 PM -0500 |
V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2024-21833 |
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115", Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115", Archer AXE75 firmware versions prior to "Archer AXE75(JP)_V1_231115", Deco X50 firmware versions prior to "Deco X50(JP)_V1_1.4.1 Build 20231122", and Deco XE200 firmware versions prior to "Deco XE200(JP)_V1_1.2.5 Build 20231120". Published: January 10, 2024; 7:15:44 PM -0500 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2024-21821 |
Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115", Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115", and Archer AXE75 firmware versions prior to "Archer AXE75(JP)_V1_231115". Published: January 10, 2024; 7:15:44 PM -0500 |
V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2024-21773 |
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115", Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115", Deco X50 firmware versions prior to "Deco X50(JP)_V1_1.4.1 Build 20231122", and Deco XE200 firmware versions prior to "Deco XE200(JP)_V1_1.2.5 Build 20231120". Published: January 10, 2024; 7:15:44 PM -0500 |
V3.1: 8.8 HIGH V2.0:(not available) |